PT0-002 · Question #567
PT0-002 Question #567: Real Exam Question with Answer & Explanation
The correct answer is A: MAC spoofing. To bypass a Network Access Control (NAC) mechanism that uses MAC address filtering, the most effective technique is MAC spoofing. This involves changing the MAC address of the attacker's device to match an allowed MAC address on the network. By doing so, the penetration tester ca
Question
A penetration tester wants to bypass a NAC mechanism that restricts access to a network circumvent the MAC and gain unauthorized access to the network. Which of the following techniques should the tester use?
Options
- AMAC spoofing
- BVLAN hopping
- CBrute-force attack
- DDNS cache poisoning
Explanation
To bypass a Network Access Control (NAC) mechanism that uses MAC address filtering, the most effective technique is MAC spoofing. This involves changing the MAC address of the attacker's device to match an allowed MAC address on the network. By doing so, the penetration tester can trick the NAC system into granting unauthorized access.
Topics
Community Discussion
No community discussion yet for this question.